3 CounterACT Highlights Point of Connection (End Point Control) Network-based, clientless solution- NO desktop client or host agent required. Policy control over all devices- managed/ unmanaged/non user. No change required to user s experience, current configuration, or login process. Turnkey appliance with a plug-and-play Virtual Firewall feature. Infrastructure Seamless integration with existing network infrastructure- no network change required. Not an inline device (typically deployed at distribution layer switch). Scalable and easy to deploy with no network redesign. Handling of all peripheral devices (printers, VoIP, WAP) in addition to host nodes. After Connection Continuous protection and enforcementall devices monitored after connection at regularly scheduled intervals or on demand. Real-time self propagating malware quarantine- does not rely on signatures or anomaly detection. Includes real-time protection from zero-day threats and malicious attackers. Introduction The network infrastructure in today s enterprises faces an incredible challenge as both business processes and workforce requirements evolve. According to the Bureau of Labor Statistics, more than seven percent of the employed workforce is made up of independent contractors 1. In addition, large public enterprises are hosting an exponentially higher number of financial auditors due to federal regulations, especially Sarbanes-Oxley. Companies face on average 4,888 labor hours 2 of multiple external auditors reviewing and discerning their internal controls, with a majority of this time spent on site utilizing the corporate LAN. These growing numbers of visitors have caused a heightened sense of awareness for ensuring that the network remains safe, while still permitting these individuals and their unknown devices to remain productive. Ultimately, the most secure thing that could be done is to not allow access by any foreign device, but this is not practical in today s business climate where organizations are forced to balance security with the needs of the business. For the last several years, the best solution available to IT and security professionals was to create a separate visitor network for conference areas, or a wireless VLAN for guest use only, which resided outside perimeter firewalls. Although this solution partially answered the need, it added one more network to be maintained by an already strained IT staff. In cases where the necessary resources were not available, some enterprises failed to restrict access, and therefore left their network open to the risk of malicious activities. For example, a contractor could connect into a wired LAN in the conference room and run a network discovery tool (e.g. NMAP) to discover what resources are present. Armed with this information, this person could steal information or attack the network without the organization ever being alerted to such behavior. So the question then becomes what is the most effective method for ensuring that outside devices gain appropriate access to remain productive, while not exposing the network to security risks. The most effective way to ensure the safety of the network from the multitude of onsite visitors is through the deployment of network access control (NAC) technology. In a recent Gartner report, vice president and Research Fellow, John Pescatore said, Without NAC enforcement, connecting unmanaged devices to sensitive business applications will result in unacceptable levels of business disruption because of network downtime and information compromise. 3 Advanced NAC technology can allow administrators to regulate the extent of access granted to visitors and their unknown devices by applying the same compliance rules on these machines as they do to corporate owned resources (i.e., managed devices). With some NAC solutions, controlling visitor access is impractical in nature since it requires the visitor to load a client/agent onto their device to gain access. Typically, this is a show stopper and can severely impair the productivity of these outside resources. ForeScout Technologies NAC appliance, CounterACT TM, solves this challenge by providing a clientless solution, which allows administrators to automatically detect unmanaged systems connecting to the network and grant appropriate access based upon the security requirement of the enterprise. 1 Contingent and Alternative Employment Arrangements February 2005, Bureau of Labor Statistics 2 Survey on Sarbanes-Oxley Section 404 Implementation April 2006, Financial Executives International 3 Findings for Secure Use of Employee Owned-PCs January 20, 2006, Gartner 3

4 The ForeScout Solution for Securing Visitor Access In order to provide a network infrastructure that remains secure during the connection of both known and unknown devices, organizations must employ an enterprise wide NAC system. The more advanced NAC solutions offer organizations a method of seamlessly integrating control into the network with minimal disruption to both employees and onsite visitors. ForeScout s CounterACT network access control solution provides administrators with easy and flexible technology which meets the demands for complete network security policy enforcement, while still maintaining the highest level of protection from self propagating malware. CounterACT provides an unparalleled level of access control and policy enforcement over all devices in the enterprise network, regardless of whether they are a company managed device, an unknown device brought in by an onsite visitor, or a non-user based device (i.e., printers, fax, VoIP phones, etc). These access controls are applied to this array of devices regardless of how the device gained connection to the network, whether it is through a wired LAN, VPN, or through a wireless access point (WAP). ForeScout s clientless, transparent system allows for easy deployment and enforcement of network policy ensuring all attached elements meet predefined security policies including complete protection for zero day self propagating threats. To meet the delicate balance between productivity and security, it is imperative that a NAC solution provides for flexibility over the types of security policies that can be deployed, along with how to properly respond when violations occur. CounterACT provides a variety of enforcement responses with the ability to apply measured and appropriate enforcement to specific pre-defined policy violations. Implementing Security Policies for Visitor Access CounterACT provides administrators with the capability to allow visitors to gain access to the network without creating added risk to the network, its critical data, and its users. By utilizing CounterACT for the automatic handling of visitor access, valuable IT resources are not consumed by the manual configuration changes required to gain access, or dealing with the possible headaches of downloading an agent or client to the endpoint device. The security polices are pre-defined by network administrators, and can range in flexibility in order to meet the specific access requirements of the organization. The most critical decision that needs to be made before the implementation of the NAC solution is the actual security policies the organization would like to enforce on visitors entering the network. Since CounterACT provides the ability to create and enforce granular security policies, any range of policies can be set, including: Move all unknown devices to a separate VLAN with Internet access only. The connecting device would be detected as a network visitor and automatically removed from the production network prior to connection. This device would no longer be subject to any further scrutiny, since it is isolated from any network resources. Require compliance with all corporate security policies for access to the Internet or other resources. Upon end user granting permission (through device login) to have their system examined for security compliance, CounterACT will interrogate the device to ensure it meets the adequate policy requirements before permitting access to the Internet or any other resources. Provide unified access control across entire network. In the case were a policy is established for specific network locations (i.e., conference rooms having only Internet access), the CounterACT system ensures this policy is enforced even when visitors manage to plug in outside of these designated area. For example, if a visitor were to get into an executive office and plug in, the CounterACT appliance would detect the device as a visitor and move it back into a quarantined VLAN. Fully block all guest devices, and allow for zero access to the Internet or other resources. CounterACT will recognize all devices that are not recognized as part of the enterprise directory structure (e.g., Active Directory, RADIUS, etc.), and will immediatly block access of the device to the network. Security policies can be created in CounterACT through standard policy templates, or customized using a simple wizard style GUI which guides the process of creating access policies. This set of policies then enables the appliance to detect device activities and endpoint violations. These conditions include a variety of values including device type, authentication, registry values, services, applications, service packs, etc. Once the appropriate policies have been determined, CounterACT provides a variety of flexible options for real time enforcement of the violation. This measured response continuum ranges from a simple notification delivered through a hijacked HTTP session that provides a dialogue box notifying the user of the policy to limiting the users access, to deploying a virtual firewall which walls the device off from specific resources, to complete and immediate disconnection from the network. The administrator has the ability to pre-determine which response should be taken based upon which policy violation that occurred. 4

5 Securing Visitor Access through Providing Secure Visitor Access How it works. CounterACT s unique approach to NAC allows enterprises to achieve maximum security by protecting the network from self-propagating malware and providing the complete ability to authenticate connecting devices before they gain access to critical network resources. When dealing with network visitors, the most critical threat requiring attention is self-propagating malware damaging the productivity of network operations. CounterACT provides a high level of protection as a default out of the box policy. Once enabled, the appliance will examine every connecting device (managed or unmanaged) for self propagating threats, including fast spreading network worms, and block/quarantine any malicious traffic. CounterACT utilizes the patented ActiveResponseTM technique for preventing infection attempts by identifying and suppressing malware before it propagates within the network. The appliance monitors traffic directed towards the protected network for signs of reconnaissance, and then identifies the techniques used, for example port or NetBIOS scans. In response to this activity, CounterACT generates virtual resources sought by malware programs and forwards the information back to them. When the malicious attacker attempts to access the protected network, CounterACT immediately recognizes it, and will prevent it from establishing communication with the targeted location. With the threat of self-propagating code in check, CounterACT can focus on determining if the device attempting to connect is a known/managed or unknown/unmanaged resource. This is done through comparison with the information stored in the directory structure (i.e., MAC address in Active Directory) or can be done through watching for successful domain or service authentication attempts. If the device is determined to be a visitor to the network, CounterACT will apply the appropriate pre-determined action for the device. In using a NAC system to handle visitor access there are two basic options which provide for an appropriate level of network access while still achieving full protection and control over the devices on the network. The first option is to isolate the device, allowing it to remain as unknown and unmanaged (see Figure 1). The device can be granted Internet access from this isolated VLAN, but would remain completely separate from the production network. The second option will attempt to authenticate the device, thereby permitting the device to be treated like a known, managed device, with the appropriate access granted (see Figure 2). In this option, the end user will be asked to grant the NAC system permission to interrogate the device for security compliance. The user would do this by simply re-logging into their device, thereby providing CounterACT with the appropriate access credentials to begin its interrogation. If the visitor does not grant permission for the interrogation, or does not have administrator rights to their machine, access will be limited or potentially blocked depending on the pre-defined policy. Typically in this case, the device would simply be moved into a quarantined VLAN as in option one. Figure 1: Option 1 Isolate the device so it can connect to the Internet Figure 2: Option 2 Attempt to authenticate the device. but not the network. 5

6 Option One: Unmanaged Device Remains Unknown, Limited Access Granted During the initial deployment of NAC across the enterprise network, the typical security policy first implemented for visitors is to allow devices to remain unknown/unmanaged, and limit their access and protect the network from their potential behavior. This policy does not require the device to achieve security policy compliance, nor requires CounterACT to regulate its compliance status during the session. 1. Recognize unknown device automatically. CounterACT will automatically recognize that an unknown device is attempting to connect to the network, regardless of the connection method (WAP or wired LAN). 2. Move unknown device to separate VLAN. With the multitude of switch integrations offered by ForeScout, CounterACT is able to isolate the specific device and assign it to a designated VLAN. This VLAN can be quarantined from the rest of the enterprise network, and will provide the appropriate access, as pre-determined by the administrator. In most cases, this will be Internet access only. 3. Protect network from self-propagating malware. Regardless of the device remaining unmanaged, CounterACT will continue to protect the network from any self propagating malware, including zero-day attacks that may result from this device. This allows administrators to be assured that not only will their critical data be protected, but network uptime and business continuity will not be at risk due to unknown devices. Option Two: Unmanaged Device Obtains Authentication, Appropriate Access Granted Depending on the policy of the organization, administrators have the option to require unmanaged devices to obtain authentication in order to gain access to the Internet or other critical resources. Once the appropriate policies and enforcements are in place, CounterACT will automatically handle all visitors with minimal disruptions, based upon the pre-defined rules, and quickly move the device through several process steps in order to secure the network during the entire connection of the unknown device. 1. Request permission for registry scan. Upon connection attempt, CounterACT will open an automated dialogue window asking the visitor to grant permission to perform a deep interrogation, or host property scan, of their endpoint. Unlike other NAC solutions, there is no form of agent or client, including Active X, being downloaded to the endpoint. The end user grants this access by simply re-logging into their device. 2. Conduct deep interrogation of unknown endpoint. Upon acknowledgement, CounterACT can conduct a deep interrogation, or host property scan, of the endpoint to determine its status and compliance with corporate security policies. During this time, CounterACT will gather a significant amount of data from the connected device. This information is stored in the built in Network Information Portal, which provides a searchbased database for providing audit trails and forensic reporting in case of malicious activity. If a malicious threat is detected on the visitor device post connection, CounterACT will block the infection and provide a complete security snapshot of what devices were affected and the remediation that was accomplished by the CounterACT response. 3. Enforce and remediate policy violations. Upon completion of the interrogation, CounterACT will either grant access to the compliant device, or it will follow the appropriate pathway to enforcement, in order to ensure the highest level of network security. CounterACT is one of the few NAC solutions that offers a range of enforcement options that provide for maximum productivity and minimal disruptions. If a network access policy is limited to on or off responses, only very critical violations can be enforced without severely impacting user productivity. The chart below highlights the breath of enforcement responses available through CounterACT. This extends beyond the functionality of handling network visitors to provide a comprehensive access control solution. Update Network ACL: ForeScout has developed a full catalogue of network API level device plug-ins which allows the appliance to communicate with network elements like switches, routers, and firewalls. This response is then used to deny access to a visitor device that is not compliant with network policy, effectively blocking the device from connecting at the infrastructure level. Alerts: CounterACT will alert appropriate network administrators to specific policy violations of unknown devices. This is accomplished through SNMP traps, Syslog export, API level integration with trouble ticketing systems to automatically open a trouble ticket, , and pager notification. Engage/Inform: CounterACT will engage the visitor who is in violation of security policy. The appliance will hijack the HTTP session and present the user with a dialogue box explaining which corporate policy has been violated. The visitor can choose to self remediate, or may be instructed to contact a network administrator before being allowed on the network. Limit Network Access: A key feature of CounterACT is the ability to provide a plug and play virtual firewall which protects critical network resources from unauthorized access,and provides protection of vulnerable systems from threats, including unknown devices. 6

7 Securing Visitor Access through Figure 3: Flexible Automatic Response Ensures the Right Response to Any Policy Violation. Move: Similar to the functions described in limiting network access, CounterACT provides a level of flexibility in enforcing network policy. The range of response allows network administrators to control which devices have access to specific areas within the network. Part of this functionality is having the ability to move connecting and connected devices between public, restricted and quarantined VLANs. Disable: The most definitive enforcement is to deny network access to a device which does not comply with the network security policies. CounterACT can do this through its own blocking mechanisms or work with network elements to close connection. In the case of switch integration, this could be accomplished through turning off the port that the device is attempting to connect to. The virtual firewall feature is built in to every CounterACT appliance. 4. Continuous Monitoring of Visitor Device. Upon successful connection to the network, CounterACT will automatically recheck the endpoint after the initial interrogation phase. The default setting for rechecking attached devices is every 10 minutes, but can be customized based upon the administrator/ network requirements. During every interrogation, CounterACT ensures that the device maintains compliance with security policies. In addition, CounterACT will also continue to employ its realtime threat prevention technology to ensure that the network remains safe from any self propagating malware, including zero-day attacks, that may propagate from this or any other devices on the network. Conclusion As enterprise networks continue to evolve with the rapidly increasing number of onsite visitors, the demand for easy to deploy, cost effective, and flexible access control security systems will only grow. ForeScout delivers a network access control solution that provides for maximum security of vital resources through its policy enforcement and built-in threat prevention engine, while ensuring maximum productivity for valuable onsite contractors, auditors, and other visitors. By implementing CounterACT and the appropriate level of security polices, enterprises can automatically secure their networks with little concern over the access of visitors and their unknown devices.... About ForeScout ForeScout delivers pervasive network security by allowing organizations to continuously monitor and mitigate security exposures and cyber attacks. The company s CounterACT appliance dynamically identifies and assesses all network users, endpoints and applications to provide complete visibility, intelligence and policy-based mitigation of security issues. ForeScout s open ControlFabric technology allows a broad range of IT security products and management systems to share information and automate remediation actions. Because ForeScout s solutions are easy to deploy, unobtrusive, flexible and scalable, they have been chosen by more than 1,500 enterprises and government agencies. Headquartered in Campbell, California, ForeScout offers its solutions through its network of authorized partners worldwide. Learn more at ForeScout Technologies, Inc. 900 E. Hamilton Ave., Suite 300 Campbell, CA U.S.A. T (US) T (Intl.) F ForeScout Technologies, Inc. Products protected by US Patent #6,363,489, March All rights reserved. ForeScout Technologies, the ForeScout logo, CounterACT and ControlFabric are trademarks of ForeScout Technologies, Inc. All other trademarks are the property of their respective owners. Doc:

ForeScout CounterACT: Contents Introduction... 3 What is the vfw?.... 3 Technically, How Does vfw Work?.... 4 How Does vfw Compare to a Real Firewall?.... 4 How Does vfw Compare to other Blocking Methods?...

WhatWorks in Blocking Network-based Attacks with Automating Network Access, Endpoint Compliance and Threat Management Controls WhatWorks is a user-to-user program in which security managers who have implemented

The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

ForeScout is a high performance security appliance that protects your network perimeter against intrusion. Unlike traditional IPS products, ForeScout is extremely easy to install and manage. It does not

ControlFabric Interop Demo Guide Featuring The ForeScout ControlFabric Interop Demo at It-Sa 2014 showcases integrations with our partners and other leading vendors that can help you achieve continuous

Comprehensive Endpoint Enforcement Overview is a complete, end-to-end network access control solution that enables organizations to efficiently and securely control access to corporate networks through

Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and

CounterACT: 802.1X and Contents Introduction...3 What is 802.1X?...3 Key Concepts.... 3 Protocol Operation...4 What is NAC?...4 Key Objectives.... 5 NAC Capabilities.... 5 The Role of 802.1X in NAC...6

Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection

Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3

McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

For ForeScout Technologies Is A Leader Among Network Access Control Vendors Excerpted From The Forrester Wave : Network Access Control, Q2 2011 by John Kindervag with Stephanie Balaouras, Robert Whiteley,

The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before

IPsonar provides visibility into every IP asset, host, node, and connection on the network, performing an active probe and mapping everything that's on the network, resulting in a comprehensive view of

The following topics provide an introduction to network discovery and identity policies and data: Host, Application, and User Detection, page 1 Uses for Host, Application, and User Discovery and Identity

Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent

Gold vs. Building the network management solution that will work for you is very easy with the Gold family just mix-and-match the Gold plug-ins that you need (WhatsVirtual, WhatsConnected, Flow Monitor,

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)

Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than

SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

CounterACT 7.0.0 by ForeScout The Test Full protection for all networks Dr. Götz Güttich With CounterACT 7, ForeScout offers a comprehensive security solution that enables companies to monitor and protect

Securing Wireless Networks for PCI Compliance Using Fortinet s Secure WLAN Solution to Meet Regulatory Requirements Introduction In the wake of many well-documented data breaches, standards such as the

BeyondInsight Version 5.6 New and Updated Features BeyondInsight 5.6 Expands Risk Visibility Across New Endpoint, Cloud and Firewall Environments; Adds Proactive Threat Alerts The BeyondInsight IT Risk

Introduction Many of today s endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices

Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the

THE SECURITY OF HOSTED EXCHANGE FOR SMBs In the interest of security and cost-efficiency, many businesses are turning to hosted Microsoft Exchange for the scalability, ease of use and accessibility available

RAVEN, Network Security and Health for the Enterprise The Promia RAVEN is a hardened Security Information and Event Management (SIEM) solution further providing network health, and interactive visualizations

Securing the University Network Abstract Endpoint policy compliance solutions take either a network-centric or device-centric approach to solving the problem. The body of this paper addresses these two

SOLUTION DESCRIPTION Alcatel-Lucent Services Security Introduction Security is a sophisticated business and technical challenge, and it plays an important role in the success of any network, service or

ForeScout CounterACT and Compliance An independent assessment on how network access control maps to leading compliance mandates and helps automate GRC operations June 2012 Overview Information security

Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution

Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity

Mobile device Management mit NAC fweisel@forescout.com 2012 ForeScout Technologies, Page 1 Die NAC Lösung Although approaches such as server-based computing and virtualization will also be used to deal

Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security

Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the

White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption